Home Anpviz CVE-2024-35341
Back to Anpviz

CVE-2024-35341

Anpviz IP Camera - Configuration File Service

Anpviz CVSS 7.5 Updated April 6, 2026

Executive Risk Summary

"The Anpviz IP Camera is vulnerable to an unauthenticated configuration file download, allowing attackers to obtain usernames and encrypted passwords. This vulnerability affects multiple Anpviz IP camera models with firmware version 3.2.2.2 and lower."

Anticipated Attack Path

  1. 1. Unauthenticated HTTP GET request to /ConfigFile.ini or /config.xml URIs
  2. 2. Download of the running configuration file containing usernames and encrypted passwords
  3. 3. Potential cracking of encrypted passwords using the hardcoded key

Am I Vulnerable?

  • Verify the firmware version of the Anpviz IP camera
  • Check for any suspicious HTTP GET requests to /ConfigFile.ini or /config.xml URIs
  • Monitor for potential password cracking attempts using the hardcoded key

Operational Audit Arsenal

Target Type Network Device
Target Asset ConfigFile.ini or config.xml
Standard Path /ConfigFile.ini or /config.xml URIs

Manual Verification Required

This is a non-Windows asset (Anpviz). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to camera functionality during firmware update

Internal Work Notes

Anpviz IP camera vulnerability allowing unauthenticated configuration file download, requiring firmware update to version 3.2.2.3 or higher.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Anpviz Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.